๐Ÿ” CVE Alert

CVE-2023-53491

UNKNOWN 0.0

start_kernel: Add __no_stack_protector function attribute

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need for a function attribute to control the omission of stack protectors on a per-function basis; at the time Clang had support for no_stack_protector but GCC did not. This was fixed in gcc-11. Now that the function attribute is available, let's start using it. Callers of boot_init_stack_canary need to use this function attribute unless they're compiled with -fno-stack-protector, otherwise the canary stored in the stack slot of the caller will differ upon the call to boot_init_stack_canary. This will lead to a call to __stack_chk_fail() then panic.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
420594296838fdc9a674470d710cda7d1487f9f4 < 25e73018b4093e0cfbcec5dc4a4bb86d0b69ed56 420594296838fdc9a674470d710cda7d1487f9f4 < 514ca14ed5444b911de59ed3381dfd195d99fe4b
Linux / Linux
2.6.30

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/25e73018b4093e0cfbcec5dc4a4bb86d0b69ed56 git.kernel.org: https://git.kernel.org/stable/c/514ca14ed5444b911de59ed3381dfd195d99fe4b